At a glance
This page describes the Pre-Deployment Phase of the Emergency Responder Health Monitoring and Surveillance (ERHMS) framework. The ERHMS framework provides recommendations for protecting emergency response and recovery workers during small and large emergencies in any setting.
Rostering and credentialing
A basic principle of safety and health in emergency response is to maintain accountability for all emergency response and recovery workers. The registration and credentialing system for emergency response and recovery workers should support four functions designed to operate with one another:
1. Registration: Recording basic and credential information on the worker.
2. Emergency credentialing: Assigning a credential level based on an individual's certification and education.
3. Re-verification: Periodically confirming an individual's information.
4. Emergency badging: Assigning an identification badge in accordance with the credential level.
Resources
Pre-deployment health screening
Pre-deployment health screening establishes a baseline physical and emotional health status. Entrance physical exams to determine fitness for duty or subsequent fitness-for-duty exams may provide this information. This baseline information allows for more informed interpretation of possible post-deployment adverse effects. It is potentially valuable when exposure information is difficult or impossible to get or interpret.
Baseline health assessments should address the emergency response and recovery worker's physical and emotional health and immunization status. Pre-deployment screening can also serve as an opportunity to assess whether individuals with the appropriate education, training, and experience are assigned.
Resources
Health and safety training
Training is critical to prepare emergency response and recovery workers to perform duty-specific tasks. Certain tasks may have federal, state, or locally mandated training requirements. Training focused on site-specific hazards, operating procedures, and available resources is needed, regardless of prior training. This can help workers recognize and avoid possible health and safety incidents, impacting their performance, survivability, and resilience.
Ongoing analysis of ERHMS data can identify training needs and procedure changes that could reduce injuries, illnesses, and near misses. The ERHMS framework can also provide valuable post-disaster data to evaluate the impact of training on injury and illness rates.
Resources
Data management and information security
Computer databases provide an excellent format for managing emergency response and recovery workers' information. However, this information can include private and personally identifiable information. Stored information must be secure. Computer systems must be compatible to maintain privacy as required by law and to facilitate efficient communication between responding agencies.
Addressing these issues in the pre-deployment phase ensures accurate management of emergency response and recovery workers during deployment. It also enables reliable, comprehensive monitoring and surveillance post-deployment.
There are six recommended steps to develop an effective pre-deployment information system security plan to use in the field. These steps can significantly improve information confidentiality, integrity, and availability:
1. Form an information security structure. This can be one individual, such as the Information Security Officer. Their responsibility is to lead the development and implementation of all information security policies and procedures.
2. Perform a baseline assessment of security needs. Identify and evaluate any pre-existing internal policies and procedures, mutual contracts or obligations, and all security-related assets.
3. Identify relevant laws, regulations, and statutes applicable to the agency and information collected.
4. Develop a work plan. Outline the necessary steps and responsibilities based on the baseline assessment and the applicable regulations.
5. Acquire and implement necessary security procedures.
6. Begin to manage risk through incremental changes.
Resources
Data management and information security